shoyo / acoustic-keyloggerLinks
Pipeline of a keylogging attack using just an audio signal and unsupervised learning.
☆154Updated 3 years ago
Alternatives and similar repositories for acoustic-keylogger
Users that are interested in acoustic-keylogger are comparing it to the libraries listed below
Sorting:
- MacStealer: Wi-Fi Client Isolation Bypass☆523Updated this week
- Let's brute force this hotel's tv.☆82Updated 6 years ago
- ☆133Updated 6 years ago
- IPv4 and IPv6 traceroute fake hop generator through IP spoofing☆121Updated last year
- Hash identification program.☆153Updated 3 years ago
- Audio file steganography. Hides files or text inside audio files and retrieve them automatically☆294Updated 2 years ago
- Collaborative programming environment inside GitHub Actions – like Google Docs for hacking☆71Updated 2 years ago
- This tool can decrypt a BitLocker-locked partition with the TPM vulnerability☆214Updated 3 years ago
- A targeted DNS cache poisoner☆124Updated 3 years ago
- Recovers pixelized text from images☆227Updated 3 years ago
- Minimalist Asterisk Caller ID Spoofer and Secondary VOIP Line Configuration Built for AWS☆309Updated 5 years ago
- Mirage is a powerful and modular framework dedicated to the security analysis of wireless communications.☆308Updated 8 months ago
- Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR/EDR and BLE [CVE-2019-9506]☆185Updated 3 years ago
- A tool for processing a lot of pcaps using tshark☆154Updated 2 years ago
- Independent research white paper by Jon “GainSec” Gaines examining the security posture of a connected public safety technology ecosystem…☆135Updated last month
- This python script uses TOR to get a new IP address.. For whatever reason you might need that☆45Updated last week
- "Unoriginal-Rice-Patty" is my personal title for the Replay-based attack on Honda and Acura vehicles☆349Updated last year
- Figlet fonts for crimes☆48Updated last year
- ☆127Updated 3 years ago
- A pure-Python ARP Cache Poisoning (a.k.a "ARP Spoofing") tool☆285Updated 4 years ago
- Using Telegram's "People Nearby" feature to pinpoint people (technically) around the globe☆86Updated 4 years ago
- Simple steganography program based on the LSB method.☆125Updated 2 years ago
- Tool for red teamers to decode keys and master keys from side channel information. Released at DEF CON 28.☆32Updated 5 years ago
- Rainbow table generation & lookup tools. Make Rainbow Tables Great Again!☆211Updated 4 years ago
- Freedom Shield was developed to protect the rights of individuals to peaceably assemble and petition their government.☆81Updated 5 years ago
- Poor man's rubber ducky☆74Updated 6 years ago
- Source to www.draw.io☆98Updated 6 years ago
- Script for orchestrating mana rogue WiFi Access Points.☆242Updated 10 months ago
- ☆232Updated 2 years ago
- Hashcat WPA/WPA2 server☆70Updated 9 months ago